Program Hosts
Walker Dimon
AI for Cyber Group Leader
MITRE

Christina Liaghati
AI Department Manager
MITRE

Martin Stanley
AI and Cybersecurity Researcher
NIST

James Rutt
CISO
The Dana Foundation

Jonathan Litchman
Co-Founder & CEO
The Providence Group

Sam Rehman
CEO
Hitachi Cyber

Andy Chun
Founder
B9AI

Derek Melber
Technology Strategist
Guidepoint Security

Dean Sapp
CISO
Filevine

Mark Kraynak
Founding Partner
Acrew Capital

Michelle Dennedy
Chief Data Strategy Officer
Abaxx Technologies

Michael Myint
CISO
AdaptHealth

Zaheer Shaikh
CISO
Al Maryah Community Bank

Kevin McDonald
CISO
Alvaka

Chloe Autio
Founder and CEO
Autio Strategies

Rick Doten
CISO
Centene Corporation

Merlin Namuth
CISO
City and County of Denver

J. Michael Daniel
President & CEO
Cyber Threat Alliance

Apostol Vassilev
Research Team Supervisor
NIST

Tyson Kopczynski
CISO
WhiteRabbit

Rob van der Veer
Chief AI Officer
Software Improvement Group

Mark Butler
VP Security Solutions
Trace3

Patrick Angel
CISO
WGroup

Michael Nouguier
Partner & CISO
Richey May

Eidan Siniver
Cyber, Data & AI CTO
Team8

Michael Morgenstern
Partner
DayBlink Consulting

Karina Klever
CEO / CISO
Klever Compliance

Tim Dzierzek
Director, Security and Compliance
Atomic

Benjamin Dulieu
CISO
Duck Creek Technologies

Michelle Dennedy
Chief Data Strategy Officer
Abaxx Technologies

PANEL: Gauging Enterprise Readiness for Agentic AI Security
- Kevin Jackson
- Gidi Cohen
- Ziv Karliner
- Alex Polyakov
- Jonathan Litchman
Gauging Enterprise Readiness for Agentic AI Security
This panel discusses ways in which enterprises can gauge readiness for agentic AI security, covering threat models, risk assessment, defensive tooling, regulatory compliance, and real‑time governance playbooks. Experts share pragmatic advice—continuous automated red‑teaming, identity and data posture controls, discovery of shadow AI, and concise board‑level narratives—to help security teams prioritize fast, actionable steps that reduce risk and enable safe AI adoption.
Autonomous AI Agents for End-to-End SOC Operations: eliminating alert fatigue and automating the full triage-to-resolution lifecycle
Ambuj Kumar and Anton discuss AI SOC, alert fatigue, and tribal knowledge, exploring how AI agents can automate triage, investigations, and MDR workflows while preserving human judgment.


Analyst Briefing
Benchmarking Continuous AI Risk Detection & LLM‑Guardrail Remediation
Powered by the world's most advanced AI threat database, Enkrypt’s capabilities are based on proprietary databases that combine insights from GenAI applications, open source data, and our dedicated ML research. Detects threats, removes vulnerabilities, and monitors performance for continuous insights.


Executive Overview

Platform Demo
Evaluating AI‑Native Terminals for Technical Ops: Security & Compliance
How to bring Agentic execution to security, DevOps, and IT via one platform where AI analyzes context, takes action across systems, and verifies outcomes in production.


Executive Overview
Assessing “Always‑On” AI Security: Model Vetting, Red‑Teaming & Runtime Monitoring
Each product in the Protect AI suite is backed by 17k+ security researchers from the huntr community, and in partnership with Hugging Face, our first- and third-party threat research feeds our products so teams can stay ahead of attackers.


Executive Overview

Platform Demo
Testing Agentic Security for Agentic AI Applications
Agentic-native models for detection and minimal false positives, sub-second guardrail and detection performance designed for real production workloads and enterprise-grade privacy, isolated data paths, and adaptive guardrails that continuously improve without human tuning are the hallmarks of Straiker’s technology.


Analyst Briefing

Platform Demo
Comparing Unified AI Security Platforms for LLMs, RAG & AI Agents
To secure the entire AI ecosystem you must have full visibility and control over LLMs, RAG systems and autonomous agents. Without this comprehensive security and governance you cannot ensure your organization is safe, compliant and ready for the AI-driven future


The Role of AI at Noma
Measuring Real‑Time Visibility & Behavior‑Based Governance for Every Model & Agent
Govern human and AI agent workforces with network wide visibility and behavior based controls. Protect models and applications with runtime defense, enabling innovation with an enterprise-first, private instance architecture.


Executive Overview

Platform Demo
Profiling Agentless SaaS Controls to Minimize Promptware & Anomalous AI Behavior
Protection across the entire Agent ecosystem and organizations’ modern environments (e.g. misconfigurations, tool usage, triggers, and runtime behavior) to give security teams a unified, intent-aware view of agent activity. Our dynamic graph stitches together build-time and runtime data, revealing how individual issues compound into real risk.


Analyst Briefing
AI-Powered Data Classification: automating sensitive data discovery and protection at enterprise scale
Kriptos uses artificial intelligence to automatically classify, tag, and protect sensitive data across your organization — eliminating the manual effort of data labeling and ensuring consistent policy enforcement regardless of where data lives.


Executive Interview
Natural Language Security Analytics: querying your security data the way you think about it
Aiquery enables security teams to query and analyze their data using natural language — eliminating the barrier between analyst intent and actionable insight without requiring deep knowledge of query languages or data schemas.


Executive Interview
AI Security Posture Management: governing and securing your AI applications from development to production
Singulr AI provides comprehensive AI security posture management — discovering AI assets, detecting misconfigurations and data risks, and enforcing governance policies across your entire AI application landscape.


Executive Interview
AI Application Security Testing: automated red teaming and vulnerability assessment for LLM-powered systems
Bonfy.ai automates security testing for AI-powered applications — identifying prompt injection, jailbreaks, data leakage, and model manipulation risks before they reach production through continuous red teaming and assessment.


Executive Interview
Extended Security Visibility: unified threat detection across cloud, endpoint, and network attack surfaces
WideField provides unified security visibility that correlates signals across cloud infrastructure, endpoints, and network traffic — giving security teams the broad situational awareness needed to detect and respond to modern multi-stage attacks.


Executive Interview
AI Model Security: detecting trojans, backdoors, and adversarial vulnerabilities in machine learning systems
TrojAI specializes in AI model security — detecting hidden backdoors, trojan attacks, and adversarial vulnerabilities embedded in machine learning models before they can be exploited in production systems.


Executive Interview
Continuous AI Red Teaming: automated adversarial testing throughout the AI development lifecycle
Mindgard delivers continuous AI red teaming that automatically tests models and AI-powered applications against the full spectrum of adversarial attacks — from prompt injection and jailbreaks to model extraction and data poisoning.











